Security News

Email-borne threats: Watch your inbox closely on Thursdays (Help Net Security)
2017-06-08 20:27

Malicious email attachment message volume spikes more than 38% on Thursdays over the average weekday volume. Ransomware attackers in particular favor sending malicious messages Tuesday through...

Using History to Overcome the Challenge of Threat Intelligence Data Overload (Security Week)
2017-06-08 13:27

Applying Unfiltered Threat Intelligence to Defenses Generates Significant False Positives read more

Threat Modeling the Internet of Things Part 2: Three Steps to Pizza (Security Week)
2017-06-07 17:16

Part 1 of this series posited that the Internet of Things (IoT) needs a more rigorous security application than it currently has, lest we end up building another patchy, vulnerability-ridden...

Dark web fraud guides reveal potential threats to orgs (Help Net Security)
2017-06-07 15:02

An in-depth look at content from more than 1,000 fraud guides available for sale on the dark web revealed that the majority of these guides are useless. Still, as many as 20 percent have the...

Whitepaper: Confronting advanced threats as an organization (Help Net Security)
2017-06-06 22:00

Global cybersecurity issues have gone mainstream, but email security has curiously slipped by the wayside despite the fact that 91% of today’s targeted attacks start with email. What’s more, while...

Stealthy DDoS attacks distract from more destructive security threats (Help Net Security)
2017-06-06 13:30

The greatest DDoS risk for organisations is the barrage of short, low volume attacks which mask more serious network intrusions. Despite several headline-dominating, high-volume DDoS attacks over...

Government Contractors Required to Provide Insider Threat Awareness Training (Security Week)
2017-06-05 13:48

Change Two to the National Industrial Security Program Operating Manual (NISPOM 2) came into force at the end of May 2017. One of the biggest changes involves a new requirement for contractors to...

Analysis: Evolving Russian Cyber Threats (InfoRiskToday)
2017-06-02 10:48

The latest ISMG Security Report focuses on evolving Russian cyber threats, including manipulating hacked documents as part of a disinformation, cyber-espionage campaign.

Ohio Companies Unite to Share Threat Intelligence (Security Week)
2017-05-31 19:37

Cybersecurity is a form of asymmetric warfare. The attackers need to only succeed once; the defenders must succeed constantly. The attackers share weapons and methods continuously; the defenders...